Lucene search

K
oraclelinuxOracleLinuxELSA-2023-13047
HistoryDec 14, 2023 - 12:00 a.m.

kernel security update

2023-12-1400:00:00
linux.oracle.com
9
kernel update
uaf fix
password reset
rx buffer
certificate update
signing disable
oracle linux
ima certificate
debranding
nmap
upstream reference.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%

  • [5.14.0-362.13.0.1_3.OL9]
  • cifs: Fix UAF in cifs_demultiplex_thread() (Zhang Xiaoxu) (Steve French) {CVE-2023-1192}
  • fs/smb/client: Reset password pointer to NULL (Quang Le) (Steve French) {CVE-2023-5345}
  • igb: set max size RX buffer when store bad packet is enabled (Tony Nguyen) (David S. Miller) {CVE-2023-45871}
  • [5.14.0-362.8.1_3.OL9]
  • Update Oracle Linux certificates (Kevin Lyons)
  • Disable signing for aarch64 (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
  • Remove nmap references from kernel (Mridula Shastry) [Orabug: 34313944]
  • Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
  • Disable unified kernel image package build
  • Add Oracle Linux IMA certificates
  • 5.14.0
  • Debranding patches copied from Rocky Linux (Louis Abel and Sherif Nagy from RESF)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%